Results 1 to 10 of about 167,764 (227)

Improved collision detection of MD5 with additional sufficient conditions

open access: goldElectronic Research Archive, 2022
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang   +6 more
doaj   +2 more sources

Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]

open access: yesViruses
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss   +3 more
doaj   +2 more sources

Криптоанализ MD5 [PDF]

open access: yesВестник Национального технического университета Харьковский политехнический институт. Серия: Информатика и моделирование, 2005
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до ...
Гугнин, Владимир Николаевич   +1 more
core   +4 more sources

DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5

open access: diamondSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko   +3 more
doaj   +3 more sources

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +2 more sources

Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]

open access: yesSensors
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey   +4 more
doaj   +2 more sources

Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

open access: diamondEngineering Science and Technology, an International Journal, 2017
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi   +2 more
doaj   +2 more sources

Add "Salt" MD5 Algorithm’s FPGA Implementation

open access: diamondProcedia Computer Science, 2018
Abstract At present, the MD5 algorithm in network security of got to a wide range of applications in many respects, but in be used actually face being hit by a "rainbow table" library of security risks, this design adopts the method of "salt", based on the proposed encryption definitely added to the random Numbers to reduce the risk.
Ye Tian   +4 more
openaire   +2 more sources

Key Change Strategies for TCP-MD5

open access: green, 2007
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openaire   +4 more sources

Avalanche of MD5

open access: diamondEnergy Procedia, 2011
Fanbao Liu, Yi Liu
openaire   +2 more sources

Home - About - Disclaimer - Privacy